Kato et al., 2001 - Google Patents
Risk analysis and secure protocol design for WWW-based remote control with operation-privilege managementKato et al., 2001
- Document ID
- 17924862497428982292
- Author
- Kato H
- Furuya M
- Tamano-Mori M
- Kaneko S
- Nakano T
- Publication year
- Publication venue
- 2001 IEEE International Conference on Systems, Man and Cybernetics. e-Systems and e-Man for Cybernetics in Cyberspace (Cat. No. 01CH37236)
External Links
Snippet
The paper discusses security issues related to the use of the Internet for remote control of decentralized systems. After conducting risk analysis based on the detection of potential threats, we designed a Secure Tele-operation Protocol (STP) specification for Internet-based …
- 238000004458 analytical method 0 title abstract description 8
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Garg et al. | Securing iot devices and securelyconnecting the dots using rest api and middleware | |
| US8910241B2 (en) | Computer security system | |
| US7231526B2 (en) | System and method for validating a network session | |
| Varadharajan et al. | An analysis of the proxy problem in distributed systems | |
| KR101076848B1 (en) | Reducing network configuration complexity with transparent virtual private networks | |
| CA2654381C (en) | Policy driven, credential delegation for single sign on and secure access to network resources | |
| US7992200B2 (en) | Secure sharing of transport layer security session keys with trusted enforcement points | |
| US20050005133A1 (en) | Proxy server security token authorization | |
| CN109716725B (en) | Data security system, method of operating the same, and computer-readable storage medium | |
| CN114666341B (en) | Method for implementing de-centralized SDP controller and computer storage medium | |
| JP2022530406A (en) | Improved transmission of data or messages on vehicles using the SOME / IP communication protocol | |
| Yerlikaya et al. | Authentication and authorization mechanism on message queue telemetry transport protocol | |
| WO2002089444A1 (en) | Method and system for authenticating a personal security device vis-a-vis at least one remote computer system | |
| CN110855561A (en) | Intelligent gateway of Internet of things | |
| JP2010505334A (en) | System and method for facilitating secure online transactions | |
| US20090144436A1 (en) | Reverse network authentication for nonstandard threat profiles | |
| JP6266170B2 (en) | Three-tier security and calculation architecture | |
| Kato et al. | Risk analysis and secure protocol design for WWW-based remote control with operation-privilege management | |
| US20050097322A1 (en) | Distributed authentication framework stack | |
| WO2009005698A1 (en) | Computer security system | |
| Gagana et al. | Secure Authentication and Security System for IoT Environment | |
| Gupta et al. | SeCrypt: A Password Manager | |
| Mwikyaa et al. | SHARING WEB SERVICES BETWEEN ENTERPRISES:" TRUSTED NETWORK | |
| JP2006121440A (en) | Medical system, medical data management method and communications program for medical data management | |
| Prasetijo et al. | Firewalling a Secure Shell Service |